00:15:00

CompTIA Security+ Practice Test (SY0-701)

Use the form below to configure your CompTIA Security+ Practice Test (SY0-701). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Security+ SY0-701 (V7)
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Security+ SY0-701 (V7) Information

CompTIA Security+ Certification Exam Overview

The CompTIA Security+ certification is a vendor-neutral credential that validates foundational security skills and knowledge. The current version of the exam is SY0-701. The SY0-701 exam is a computer-based test that consists of up to 90 questions, with a duration of 90 minutes. Candidates must achieve a minimum passing score of 750 points on a scale of 100-900.

Question Types on the Security+ Exam

The Security+ exam includes two primary types of questions:

  • Multiple-Choice/Multiple-Selection Questions: These questions require candidates to select one or more correct answers from a list of options.
  • Performance-Based Questions (PBQs): These questions involve solving problems in a simulated IT environment, such as command prompt or networking environments. PBQs are also featured in other CompTIA exams, like A+ and Network+.

Exam Prerequisites

CompTIA does not enforce any prerequisites for the Security+ exam. However, it is recommended that candidates have the CompTIA Network+ certification and at least two years of experience in IT administration with a focus on security. Additionally, CompTIA suggests that candidates be at least 13 years old.

Security+ Exam Domains

The SY0-701 exam focuses on five primary domains:

  • General Security Concepts (12%)
  • Threats, Vulnerabilities, and Mitigations (22%)
  • Security Architecture (18%)
  • Security Operations (28%)
  • Security Program Management and Oversight (20%)

These domains are detailed in the exam objectives, which outline the scope of the test, including domain weighting, test objectives, and example topics.

Exam Renewal Policy

The Security+ certification, along with other CompTIA certifications, must be renewed every three years. The bridge exam scheme was retired on December 31, 2010. Post-January 1, 2011, all new certifications are valid for three years from the date of certification. Renewal can be achieved by passing the latest version of the exam or through the Continuing Education (CE) program. This program allows candidates to keep their skills current through various activities that demonstrate industry knowledge.

Testing Centers

CompTIA exams, including Security+, are available exclusively through Pearson VUE testing centers since July 9, 2012. Exams can be scheduled online, by phone, or at the testing center. Candidates can choose between in-person exams at Pearson VUE centers or online testing.

The CompTIA Security+ certification ensures that IT professionals possess the essential security skills and knowledge required to protect and manage today's increasingly complex IT environments.

More reading:

Free CompTIA Security+ SY0-701 (V7) Practice Test

Press start when you are ready, or press Change to modify any settings for the practice test.

  • Questions: 15
  • Time: Unlimited
  • Included Topics:
    General Security Concepts
    Threats, Vulnerabilities, and Mitigations
    Security Architecture
    Security Operations
    Security Program Management and Oversight
Question 1 of 15

Your company, SecureTech Inc., specializes in developing financial software. As part of the Risk Management team, you have been tasked with analyzing the potential risks associated with a newly identified software vulnerability that could allow unauthorized access to financial data. Which of the following would best categorize the risk in terms of the impact to your organization should this vulnerability be exploited?

  • High impact

  • Low impact

  • Insignificant impact

  • Acceptable impact

Question 2 of 15

Which type of digital certificate allows an organization to secure all subdomains of a domain with a single certificate?

  • Extended Validation certificate

  • Wildcard certificate

  • Root certificate

  • Self-signed certificate

Question 3 of 15

As the IT security specialist for your company, you have noticed an unusual increase in employees reporting suspicious emails that attempt to lure them into providing their login credentials. The email claims that the company's email system is undergoing maintenance and employees need to log in to a special portal to continue having access to their emails. Which type of attack is most likely occurring?

  • Smishing

  • Typosquatting

  • Phishing

  • Vishing

Question 4 of 15

A company is evaluating options for remote employees to securely access the corporate network. Which of the following solutions would provide the BEST security for sensitive corporate data while maintaining reliable connectivity?

  • Allowing remote access through a basic tunneling protocol with no additional encryption

  • Installing a jump server that remote employees can connect to before accessing the corporate network

  • Utilizing remote access software without two-factor authentication for user convenience

  • Implementing a Virtual Private Network (VPN) with strong encryption standards for remote connections

Question 5 of 15

A security analyst has just finished applying patches to a critical server to address several vulnerabilities discovered during a recent scan. What is the most important next step the analyst should take to validate the remediation efforts?

  • Reboot the server to ensure all patches are fully applied.

  • Document the applied patches in the change management system.

  • Review the server's event logs for new error messages.

  • Perform a follow-up vulnerability scan on the server.

Question 6 of 15

A systems administrator was recently passed over for a promotion and has expressed significant resentment towards management. A security analyst is concerned the administrator might retaliate against the organization. Which of the following BEST describes the primary reason this employee poses a significant threat?

  • The employee has privileged access and detailed knowledge of the organization's systems and potential vulnerabilities.

  • The employee can use social engineering techniques to deceive other users and escalate privileges.

  • The employee can physically damage network hardware in the data center without being detected.

  • The employee is likely to collaborate with an organized crime group for financial gain.

Question 7 of 15

What is a primary benefit of incorporating automation into security operations?

  • Eliminates the need for a structured security policy

  • Simplifies the process of user security awareness training

  • Increases efficiency by performing repetitive tasks quickly and without human intervention

  • Removes the requirement for real-time threat monitoring

Question 8 of 15

Your company is in the process of selecting a cloud service provider to host critical infrastructure. Your management team wants to ensure thorough evaluation of potential vendors to avoid legal, compliance, and operational risks. Which of the following actions exemplifies proper due diligence in this scenario?

  • Agree on the pricing and service level agreements.

  • Review the company's own internal information security policies.

  • Review third-party audit reports of the vendors.

  • Select a vendor based on the recommendation of an acquaintance at a partnering organization.

Question 9 of 15

Your organization relies on a variety of hardware components from multiple vendors to maintain its data center operations. Recently, a widespread vulnerability was discovered in the supply chain affecting a specific model of server motherboards used in your data center. What is the most effective initial action to mitigate the risk associated with this vulnerability?

  • Train staff to recognize the signs of a compromised server that could result from this vulnerability.

  • Switch to a different hardware vendor not affected by the vulnerability.

  • Check for and apply official security patches from the affected hardware vendor.

  • Conduct an internal risk assessment to evaluate the impact of the vulnerability.

Question 10 of 15

A medium-sized financial institution is looking to improve its security operations. Among the numerous improvements, the institution's IT management team is evaluating how implementing automation and orchestration could be advantageous. Which of the following would be considered a primary benefit of incorporating automation and orchestration into their security operations?

  • They enable unlimited scaling of resources without any additional cost implications.

  • All event logs will be stored in a centralized repository without the need for a dedicated team to manage the storage solutions.

  • It permits individual users to set their preferences for security settings on their own devices, enhancing user satisfaction.

  • Automation and orchestration can enforce security baselines efficiently throughout the organization.

Question 11 of 15

Which method hides data within other data or files to conceal its existence?

  • Data Masking

  • Digital Signatures

  • Steganography

  • Tokenization

Question 12 of 15

Which mechanism would most securely facilitate the exchange of encryption keys over a public network?

  • Elliptic Curve Diffie-Hellman (ECDH)

  • Remote Access Service (RAS)

  • Hash-Based Message Authentication Code (HMAC)

  • Office of Personnel Management (OPM)

Question 13 of 15

A company's change management procedure requires that any modifications to the IT infrastructure undergo a review process. Before final approval, which document should primarily guide the decision on whether the change is in line with organizational security policies and standards?

  • Business Continuity Plan (BCP)

  • Software Development Lifecycle (SDLC) document

  • Acceptable Use Policy (AUP)

  • Information Security Policies

Question 14 of 15

Reconstructing documents transferred over SSL/TLS encrypted sessions is feasible using packet captures without the need for the encryption keys.

  • True

  • False

Question 15 of 15

What does the term 'complexity' relate to in the context of security operations?

  • The extent to which systems, processes, and technologies are interconnected and intricate, potentially making them harder to secure

  • The number of users that have access to a system

  • The difficulty level of an attacker required to exploit a system

  • The level of encryption used to protect data